Results 1 to 10 of about 160,083 (235)
Performance analysis of MD5 [PDF]
MD5 is an authentication algorithm proposed as the required implementation of the authentication option in IPv6. This paper presents an analysis of the speed at which MD5 can be implemented in software and hardware, and discusses whether its use interferes with high bandwidth networking.
Joseph D. Touch
openaire +3 more sources
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC [PDF]
In this paper, we present the first distinguishing attack on HMAC and NMAC based on MD5 without related keys, which distinguishes the HMAC/NMAC-MD5 from HMAC/NMAC with a random function. The attack needs 297 queries, with a success probability 0.87, while the previous distinguishing attack on HMAC-MD5 reduced to 33 rounds takes 2126.1 messages with a ...
Hongbo Yu+4 more
openaire +3 more sources
Architecture based on MD5 and MD5-512 Bit Applications
Researchers have found many flaws in hash function such as MD5 algorithm. It has been one of the most widely used hash algorithm and it has been indicated that there is a security threat in the algorithm. Furthermore, a MD5 hash output may not offer sufficient protection in the near future.
Vandana Pandey, V. K Mishra
openaire +3 more sources
Collisions for the compression function of MD5 [PDF]
At Crypto '91 Ronald L. Rivest introduced the MD5 Message Digest Algorithm as a strengthened version of MD4, differing from it on six points. Four changes are due to the two existing attacks on the two round versions of MD4. The other two changes should additionally strengthen MD5. However both these changes cannot be described as well-considered.
den Boer, Bert, Bosselaers, Antoon
openaire +3 more sources
We propose an efficient attack to recover the passwords, used to authenticate the peer by EAP-MD5, in the IEEE 802.1X network. First, we recover the length of the used password through a method called length recovery attack by on-line queries. Second, we crack the known length password using a rainbow table pre-computed with a fixed challenge, which ...
Fanbao Liu, Tao Xie
openaire +3 more sources
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed+8 more
wiley +1 more source
archivist: An R Package for Managing, Recording and Restoring Data Analysis Results [PDF]
Everything that exists in R is an object [Chambers2016]. This article examines what would be possible if we kept copies of all R objects that have ever been created.
Biecek, Przemyslaw, Kosinski, Marcin
core +3 more sources
Chosen-prefix collisions for MD5 and applications [PDF]
We present a novel, automated way to find differential paths for MD5. Its main application is in the construction of chosen-prefix collisions. We have shown how, at an approximate expected cost of 239 calls to the MD5 compression function, for any two chosen message prefixes P and P', suffixes S and S' can be constructed such that the concatenated ...
Stevens, M.+2 more
openaire +2 more sources
A High-Resolution Hubble Space Telescope Study of Apparent Lyman Continuum Leakers at $z\sim3$ [PDF]
We present $U_{336}V_{606}J_{125}H_{160}$ follow-up $HST$ observations of 16 $z\sim3$ candidate LyC emitters in the HS1549+1919 field. With these data, we obtain high spatial-resolution photometric redshifts of all sub-arcsecond components of the LyC ...
Mostardi, Robin E.+5 more
core +2 more sources
Randomisation before consent : avoiding delay to time-critical intervention and ensuring informed consent [PDF]
Peer ...
Cotmore, Richard+6 more
core +2 more sources